Lucene search

K
nvd[email protected]NVD:CVE-2023-22842
HistoryFeb 01, 2023 - 6:15 p.m.

CVE-2023-22842

2023-02-0118:15:11
CWE-121
CWE-787
web.nvd.nist.gov
5
big-ip
sip profile
vulnerability
traffic management
microkernel
termination
software versions

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

37.1%

On BIG-IP versions 16.1.x before 16.1.3.3, 15.1.x before 15.1.8.1, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a SIP profile is configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Affected configurations

Nvd
Node
f5big-ip_access_policy_managerRange13.1.013.1.5
OR
f5big-ip_access_policy_managerRange14.1.014.1.5.3
OR
f5big-ip_access_policy_managerRange15.1.015.1.8.1
OR
f5big-ip_access_policy_managerRange16.1.016.1.3.3
OR
f5big-ip_advanced_firewall_managerRange13.1.013.1.5
OR
f5big-ip_advanced_firewall_managerRange14.1.014.1.5.3
OR
f5big-ip_advanced_firewall_managerRange15.1.015.1.8.1
OR
f5big-ip_advanced_firewall_managerRange16.1.016.1.3.3
OR
f5big-ip_analyticsRange13.1.013.1.5
OR
f5big-ip_analyticsRange14.1.014.1.5.3
OR
f5big-ip_analyticsRange15.1.015.1.8.1
OR
f5big-ip_analyticsRange16.1.016.1.3.3
OR
f5big-ip_application_acceleration_managerRange13.1.013.1.5
OR
f5big-ip_application_acceleration_managerRange14.1.014.1.5.3
OR
f5big-ip_application_acceleration_managerRange15.1.015.1.8.1
OR
f5big-ip_application_acceleration_managerRange16.1.016.1.3.3
OR
f5big-ip_application_security_managerRange13.1.013.1.5
OR
f5big-ip_application_security_managerRange14.1.014.1.5.3
OR
f5big-ip_application_security_managerRange15.1.015.1.8.1
OR
f5big-ip_application_security_managerRange16.1.016.1.3.3
OR
f5big-ip_ddos_hybrid_defenderRange13.1.013.1.5
OR
f5big-ip_ddos_hybrid_defenderRange14.1.014.1.5.3
OR
f5big-ip_ddos_hybrid_defenderRange15.1.015.1.8.1
OR
f5big-ip_ddos_hybrid_defenderRange16.1.016.1.3.3
OR
f5big-ip_domain_name_systemRange13.1.013.1.5
OR
f5big-ip_domain_name_systemRange14.1.014.1.5.3
OR
f5big-ip_domain_name_systemRange15.1.015.1.8.1
OR
f5big-ip_domain_name_systemRange16.1.016.1.3.3
OR
f5big-ip_fraud_protection_serviceRange13.1.013.1.5
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.5.3
OR
f5big-ip_fraud_protection_serviceRange15.1.015.1.8.1
OR
f5big-ip_fraud_protection_serviceRange16.1.016.1.3.3
OR
f5big-ip_link_controllerRange13.1.013.1.5
OR
f5big-ip_link_controllerRange14.1.014.1.5.3
OR
f5big-ip_link_controllerRange15.1.015.1.8.1
OR
f5big-ip_link_controllerRange16.1.016.1.3.3
OR
f5big-ip_local_traffic_managerRange13.1.013.1.5
OR
f5big-ip_local_traffic_managerRange14.1.014.1.5.3
OR
f5big-ip_local_traffic_managerRange15.1.015.1.8.1
OR
f5big-ip_local_traffic_managerRange16.1.016.1.3.3
OR
f5big-ip_policy_enforcement_managerRange13.1.013.1.5
OR
f5big-ip_policy_enforcement_managerRange14.1.014.1.5.3
OR
f5big-ip_policy_enforcement_managerRange15.1.015.1.8.1
OR
f5big-ip_policy_enforcement_managerRange16.1.016.1.3.3
OR
f5big-ip_ssl_orchestratorRange13.1.013.1.5
OR
f5big-ip_ssl_orchestratorRange14.1.014.1.5.3
OR
f5big-ip_ssl_orchestratorRange15.1.015.1.8.1
OR
f5big-ip_ssl_orchestratorRange16.1.016.1.3.3
VendorProductVersionCPE
f5big-ip_access_policy_manager*cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
f5big-ip_advanced_firewall_manager*cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*
f5big-ip_analytics*cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
f5big-ip_application_acceleration_manager*cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*
f5big-ip_application_security_manager*cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
f5big-ip_ddos_hybrid_defender*cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*
f5big-ip_domain_name_system*cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*
f5big-ip_fraud_protection_service*cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*
f5big-ip_link_controller*cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
f5big-ip_local_traffic_manager*cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
Rows per page:
1-10 of 121

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

37.1%

Related for NVD:CVE-2023-22842